What can I do?

BaseRecursos

Resources

formatos disponibles

Software

Avast Antivirus

Avast Antivirus is a family of cross-platform internet security applications developed by Avast for Microsoft Windows, macOS, Android and iOS. The Avast Antivirus products include freeware and paid ve ...

The Daily Beast

Website

The Daily Beast

The Daily Beast is an American news website focused on politics, media and pop culture, founded in 2008. It has been characterized as a "high-end tabloid" by Noah Shachtman, the site's editor-in-chief ...

Person

Kevin Poulsen

Kevin Lee Poulsen (born November 30, 1965) is an American former black-hat hacker and a contributing editor at The Daily Beast.

Animal

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It also resulted i ...

Brain is the industry standard name for a computer virus that was released in its first form in 19 January 1986, and is considered to be the first computer virus for the IBM Personal Computer (IBM PC) ...

Species

Elk Cloner

Elk Cloner is one of the first known microcomputer viruses that spread "in the wild", i.e., outside the computer system or laboratory in which it was written. It attached itself to the Apple II operat ...

Planet

CryptoLocker

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers runnin ...

Military Conflict

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefin ...

Topical Concept

SQL injection

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database content ...

Ataque de intermediario

Military Conflict

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle (MITM) or person-in-the-middle (PITM) attack is a cyberattack where the a ...

Do you want to access more educational content?

Sign in Join a class
x

Add to Didactalia Arrastra el botón a la barra de marcadores del navegador y comparte tus contenidos preferidos. Más info...

Game help
Juegos de anatomía
Selecciona nivel educativo